General
-
Target
gang.rar
-
Size
7.5MB
-
Sample
250208-xx2z5s1kal
-
MD5
528a918c0a4665248468d245ffe91c9a
-
SHA1
e4e001e749f4c9c7ee99f94741c509d50541184d
-
SHA256
195ac00a0a4278fffad8f754ca723058481f97488303436ba35a739d47d3b8b0
-
SHA512
b92e643569e88458419e7b55b29e129b03d88722a99fc05a1491f3ce4c6099c829a0c482df5dd08f5122f48fd9a212c32e0fb5a00d2206fa8abc0d064f7ea7f7
-
SSDEEP
196608:W9eVgZAuNpvcIhi9GOUt43Ra5LwUpgXOH2c:W9UQpv4UtmRa5MV+Wc
Behavioral task
behavioral1
Sample
gang.rar
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral2
Sample
Builder.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
���w.pyc
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral4
Sample
READme.txt
Resource
win10ltsc2021-20250207-en
Malware Config
Targets
-
-
Target
gang.rar
-
Size
7.5MB
-
MD5
528a918c0a4665248468d245ffe91c9a
-
SHA1
e4e001e749f4c9c7ee99f94741c509d50541184d
-
SHA256
195ac00a0a4278fffad8f754ca723058481f97488303436ba35a739d47d3b8b0
-
SHA512
b92e643569e88458419e7b55b29e129b03d88722a99fc05a1491f3ce4c6099c829a0c482df5dd08f5122f48fd9a212c32e0fb5a00d2206fa8abc0d064f7ea7f7
-
SSDEEP
196608:W9eVgZAuNpvcIhi9GOUt43Ra5LwUpgXOH2c:W9UQpv4UtmRa5MV+Wc
Score10/10-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
Builder.bat
-
Size
7.6MB
-
MD5
37da96d2c3bf1fd9143144f9ae793484
-
SHA1
b152d144ad97fd5f71915334f5d5649ce7ebc1c5
-
SHA256
7b245e785c43e5b8087809d359255ed2eb02205357808a1e3a82f9fcc27df1c8
-
SHA512
fb4985ff27ae5dca480877046b4cdb15f40369f29356d7a4cb5cabed74df035f66850c552a8a5cc354d6f47fb8f24daa8779f9ae7b08b618da6f925a8cef637a
-
SSDEEP
196608:CZD+kdbdwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWm:i5wIHL7HmBYXrYoaUN5
Score10/10-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
���w.pyc
-
Size
1KB
-
MD5
9c9bba50af8c3ca9537752bdf3209c5e
-
SHA1
6990656d0e998599848fc4b0acf31a27ae5a12d6
-
SHA256
8be1105124ae6f6db5866aaf85e1f04d3f760327d15b187a2db44c8de0c96d18
-
SHA512
f7becaeae2951e1d91d0607edfed14e23596d1c825d5cf37ac454928eda150cf87fcc35b92649adcfd38cfc043bc76b435002b8e04c2adc8a778c1f39cf9dc46
Score1/10 -
-
-
Target
READme.txt
-
Size
170B
-
MD5
10a5016f49ef1acacd6998ace35d85e6
-
SHA1
49eb4d70a5aea7f79c6e545d87b4863bfa350503
-
SHA256
b30d3a21941310b108baf1dddfc8b363a81a033025ef045d267142eb9f9e78af
-
SHA512
20ba3c146ef15afb526a4bd7842f4cafb0042e2258022fd3deaa8150656d10c45714bdc8c1e48434781841bae3a9f5bd4fbe081c2dfbdd14a22f36bb0b3048f6
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1